Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


09th week of 2016 patent applcation highlights part 77
Patent application numberTitlePublished
20160065528PROVIDING NOTIFICATION PERTAINING TO MESSAGE BASED ON MESSAGE TYPE - in one aspect, a device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to receive a first message, identify at least a first type of message to which the first message pertains, and determine whether to provide a notification at the device pertaining to the first message based on the identification.2016-03-03
20160065529DISPLAY CONTROL DEVICE, DISPLAY CONTROL METHOD, AND PROGRAM - It is possible to prevent a latest message associated with a message posted in the past from being overlooked by a user. An input unit that receives input data that is input by a user, a display unit that includes a plurality of display areas in which the input data is displayed, and displays the input data from the user in a display area assigned to the user, and a display control unit that causes input data that is an associating target to be displayed in the display area in a display mode indicating that the input data that is the associating target is associated with at least one of the input data displayed on the display unit and the display area are provided.2016-03-03
20160065530METHOD AND APPARATUS FOR EXPIRING MESSAGES IN ELECTRONIC COMMUNICATIONS - The present disclosure includes systems and methods for off-the-record communication including expiring messages. An example method comprises receiving an electronic communication from a source device, the electronic communication including at least one expiring message, temporarily storing content of the expiring message in a non-durable memory for a predetermined amount of time, durably storing envelope information associated with the expiring message in a durable memory, and determining whether a recipient device for the expiring message is available to accept transmission of the expiring message and determining whether an expiration event has occurred.2016-03-03
20160065531SOURCE-AWARE TECHNIQUE FOR FACILITATING LISP HOST MOBILITY - A method is provided in one example embodiment and includes detecting by a first network element at a first data center site a local connection of an endpoint identifier (“EID”), in which the EID was previously locally connected to a second network element at a second data center site and notifying a mapping server of the local connection of the EID to the first network element. The method further includes receiving from the mapping server identifying information for the second network element and communicating with the second network element using the identifying information to obtain service information for traffic associated with the EID. The method may also include applying a service identified by the service information to outgoing traffic from the EID as well as applying a service identified by the service information to incoming traffic for the EID.2016-03-03
20160065532SYSTEMS AND METHODS FOR ADAPTIVE ASSOCIATIVE ROUTING FOR MOBILE MESSAGING - In an example implementation of the disclosed technology, a method includes assigning a computing device to a region associated with a region server that comprises a plurality of region server instances. The method also includes generating device-to-region mapping and transmitting a replica of the device-to-region mapping to a messaging server instance and connection server instance. Further, the method includes receiving local device connection information comprising connection information relating the computing device and the connection server instance. The method also includes outputting the local device connection information to the plurality of region server instances. Additionally, the method includes receiving a message for delivery to the computing device and, responsive to accessing the local device connection information, transmitting the message to the connection server instance identified by the local device connection information.2016-03-03
20160065533Cross registrar compliance and communication mechanism - What is described is a system and method providing an improved customer experience for the registrant. The registrant is able to use a single interface and a single set of user inputs to bring about changes for multiple domain names. The single interaction with the single interface works out just as well and just as conveniently regardless of whether a single registrar happens to be handling all of the domain names, or whether each domain name is handled by a different registrar.2016-03-03
20160065534SYSTEM FOR CORRELATION OF DOMAIN NAMES - Provided are methods and systems for correlation of domain names. An example method includes receiving Domain Name System (DNS) data associated with a plurality of domain names, generating multidimensional vectors based on the DNS data such that each of the domain names is associated with one of the multidimensional vectors, calculating similarity scores for each pair of the plurality of domain names based on comparison of corresponding multidimensional vectors, and clustering one or more sets of domain names selected from the plurality of domain names based on the similarity scores and such that a difference between the similarity scores corresponding to each pair of the domain names in each of clusters is below a predetermined threshold.2016-03-03
20160065535DNS-BASED RANKING OF DOMAIN NAMES - Provided is a method for domain name ranking. An example method includes receiving Domain Name System (DNS) data, which includes domain names. The DNS data is processed to obtain multiple metric values for each of the domain names. The metric values can include a query count (QC), a client count (CC), and a network count (NC). The method proceeds with calculating a score for each of the domain names based on the metric values. The calculation can be performed using the following equation: Score=NC·CC·(1+log(QC)). Furthermore, the method ranks the domain names based on the score for each of the domain names. The ranking can be based on normalization of the scores or based on converting the scores into respective percentile ranks.2016-03-03
20160065536HOME GATEWAY APPARATUS AND PACKET TRANSFER METHOD - In order to provide a home gateway apparatus capable of smoothly executing transfer processing while ensuring security, when transferring a packet between a node (2016-03-03
20160065537METHOD AND APPARATUS ENABLING INTEROPERABILITY BETWEEN DEVICES OPERATING AT DIFFERENT SECURITY LEVELS AND TRUST CHAINS - A security device enables direct communications between devices operating at different security levels. The security device receives data from a first device operating at a first security level. The data is secured at the first security level and is intended for a second device operating at a second security level that is different than the first security level. The security device determines whether a condition permitting transmission from the first device to the second device is satisfied. In response to determining that the condition is satisfied, the security device adjusts a security level associated with the data and transmits, to the first device, the data with the adjusted security level.2016-03-03
20160065538WIRELESS COMMUNICATION SYSTEMS AND METHODS - Embodiments of the invention provide methods, devices and computer programs arranged to facilitate access to device-to-device (D2D) communication services in a communication network. One embodiment includes an apparatus for use in controlling access to a D2D communication service in a communication network, the apparatus including a processing system arranged to cause the apparatus to: receive a D2D discovery signal including data indicative of said D2D communication service; determine a verification state for the D2D communication service as one of a first verification state and a second, different, verification state, on the basis of said received D2D discovery signal, the first verification state being one in which said D2D communication service can be verified by the apparatus; and in the event that said D2D communication service is determined to be in the second verification state, transmit data indicative of said D2D communication service for verification by the communication network.2016-03-03
20160065539METHOD OF SENDING INFORMATION ABOUT A USER - The invention involves detecting or scanning of a personal characteristic of a user and then verifying the person's identity by means of that physical characteristic. If the identity is confirmed, then information is disclosed, as required. In the preferred embodiment, the method of sending information about a user includes the steps of: an entity issuing an electronic identifier; detecting a personal characteristic of a user; confirming an identity of said user by means of the personal characteristic; and sending a secure electronic transmission relating to the electronic identifier to the entity with information pertaining to that user.2016-03-03
20160065540Shared Data Encryption and Confidentiality - Embodiments of the invention relate to deduplication and compression on data performed downstream from where the data is encrypted. Confidentiality of data is maintained, and the ability of storage systems to perform data reduction functions is supported. Data to be written to a storage system is separated into data chunks. Each data chunk is decrypted into a plaintext data format with a master encryption key of an owning entity. Once decrypted, one or more advanced data functions may be performed on the plaintext. A private key is created and used to encrypt the plaintext of the data chunk(s), which are stored as an encryption unit. Thereafter, a first wrapped key is created by encrypting the private key with the master key. The wrapped key is stored as metadata of the data chunk. Access to each data chunk is limited to one or more entities that have been granted access.2016-03-03
20160065541ANONYMOUS SINGLE SIGN-ON TO THIRD-PARTY SYSTEMS - An online system receives from a third-party application on a client device, an anonymous login request to anonymously log a user of the online system into a third-party system associated with the third-party application. Responsive to receiving the anonymous login request, the online system generates a permissions user interface (UI) that provides an interface component including an option for the user to anonymously log into the third-party system using the user's login information for the online system. The online system provides the permissions UI to the client device, and receives permissions information from the client device. The online system generates an anonymous identifier that allows the user to login to the third-party system. The online system provides the anonymous identifier to the third-party application to allow anonymous login of the user into the third-party system in accordance with the permissions information.2016-03-03
20160065542METHODS AND SYSTEMS FOR AUTO-COMMISSIONING OF DEVICES IN A COMMUNICATION NETWORK - Devices, methods, systems, and computer-readable media for auto-commissioning of devices in a communication network are described herein. One or more embodiments include a method for auto-commissioning of a device added to a communication network, comprising: determining properties of signal transitions of the communication network via a device added to the network while the signal transitions of the communication network are passing unchanged, and processing the signal transitions of the communication network, via the device, based on the properties of the signal transitions.2016-03-03
20160065543COMMUNICATION SYSTEM, MANAGEMENT SERVER, SERVER, CONCENTRATOR, AND ENCRYPTION SETTING METHOD - After an IP address of a concentrator is changed by a management server (management platform), a server and the concentrator acquire the changed IP address of the concentrator at each communication, and changes encryption settings so that a set encryption key will be associated with the changed IP address.2016-03-03
20160065544Simple protocol for tangible security - The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and associated secret identifiers, employs the one or more keys to encrypt a secret and utilizes the identifiers and encryptions of the secret to populate a table associated with a security token device that is used in conjunction with a mobile device to release sensitive information persisted on the mobile device for user selected purposes.2016-03-03
20160065545CRYPTOGRAPHIC KEY PAIR GENERATION SYSTEM - In certain embodiments, a system communicates a request for a user to provide a thought to facilitate generating a cryptographic key pair. The system receives a string of characters corresponding to the thought. The string of characters may be generated based at least in part upon electromagnetic signals, which the user generates by developing the thought. The system generates a cryptographic key pair based at least in part upon the string of characters. The generated cryptographic key pair may be configured to encrypt and decrypt messages.2016-03-03
20160065546SHARING CONTENT WITH PERMISSION CONTROL USING NEAR FIELD COMMUNICATION - A sending device receives a user input indicating that the user wishes to share and open item of content with a receiving device. A near field communication link is opened between the sending device and the receiving device. Metadata for sharing the open data is gathered on the sending device and a permission setting user interface display is displayed, with the user input mechanism that allows a user to set permissions corresponding to the open item. User actuation of the permission setting user input mechanism is received, the permissions are added to the open item, and the metadata is sent to the receiving device over the near field communication link. The metadata includes a location of the open item. The open item can then be accessed by the receiving device, with the permissions applied to the open item.2016-03-03
20160065547COMPUTER SYSTEM AND METHOD FOR ENCRYPTED REMOTE STORAGE - A method for remotely storing data is provided. The method comprises providing a first data file on a client computer; splitting, on the client computer, the first data file into at least two partial files; encrypting the at least two partial files with an encryption algorithm; distributing the at least two encrypted partial files in at least two remote storage locations; storing information about the at least two storage locations of the at least two encrypted partial files for a later retrieval of the at least two encrypted partial files; and storing decryption information for the decryption of the at least two encrypted partial files on the client computer. Further, a computer software product adapted for executing, when run on a computer, a method for remotely storing data is provided, and a client computer for executing the method for remotely storing data.2016-03-03
20160065548KEYCHAIN SYNCING - Some embodiments provide non-transitory machine-readable medium that stores a program which when executed by at least one processing unit of a device synchronizes a set of keychains stored on the device with a set of other devices. The device and the set of other devices are communicatively coupled to one another through a peer-to-peer (P2P) network. The program receives a modification to a keychain in the set of keychains stored on the device. The program generates an update request for each device in the set of other devices in order to synchronize the set of keychains stored on device with the set of other devices. The program transmits through the P2P network the set of update requests to the set of other devices over a set of separate, secure communication channels.2016-03-03
20160065549HIERARCHICAL DATA ACCESS TECHNIQUES - A plurality of keys is obtained, with each obtained key of the plurality of keys being based at least in part on an information set for the plurality of keys and at least one other key distinct from the plurality of keys. A signing key is calculated by inputting a combination of the plurality of keys into a function with the information set for the plurality of keys, and the signing key is used to evaluate whether access to one or more computing resources is to be granted, with the information set preventing access from being granted when a request for the access is submitted out of compliance with the information set for the plurality of keys.2016-03-03
20160065550DIFFERENT AUTHENTICATION PROFILES - A mobile device may include an authenticator and a processor. The authenticator may store one or more profiles associated with one or more keys to access one or more servers. The processor may embed one of the keys in data to be communicated to one of the servers to request access from the one of the servers. The authenticator may compare the one or more profiles to a set of parameters based upon at least one of a user's identification information, a selected program to request access, identification information of the one of the servers, identification information of an authentication register, to determine whether to select one of the profiles. If the authenticator selects one of the profiles, the authenticator may generate the one of the keys based on the selected one of the profiles.2016-03-03
20160065551SINGLE LOGIN AUTHENTICATION FOR USERS WITH MULTIPLE IPV4/IPV6 ADDRESSES - Disclosed in the authentication and authorization of a client device to access a plurality of resources, requiring a user of a client device to enter only one set of login information. Authentication and authorization of a client device to access a plurality of resources after an initial set of login information is received by a networked computing environment. After the initial set of login information is received, a series of steps are performed that may be entirely transparent to the user of the client device.2016-03-03
20160065552METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - Method, system, and programs for interoperable identity and interoperable credentials. In one example, an authentication request is received. The authentication request originated from an online user in connection with an application having a first LOA. The authentication request includes the online user's input. A digital identity is searched based on the online user's input. A GUID associated with the digital identity is obtained when the digital identity is found. One or more credentials that are bound to the GUID at the first LOA or a higher LOA are provided. A selection of at least one credential is received. Information of the selected credential that includes a credential verification service capable of verifying the selected credential is received. Verification of the selected credential of the online user based on the GUID is requested. A verification response is received. The online user is authenticated at the first LOA when the verification response indicates that the selected credential is successfully verified.2016-03-03
20160065553METHOD, SYSTEM AND RECORDING MEDIUM FOR SERVICE ACCOUNT AUTHENTICATION - Disclosed are a method, system, and storage medium for service account authentication. A user authentication method includes managing authentication information associated with a service account of a user and social information about the user; and performing user authentication with respect to the service account through a stepwise procedure in which an authentication method using the authentication information and an authentication method using the social information are combined.2016-03-03
20160065554Authentication Management - A method of managing authentication during a user session comprises the steps of operating a user session for a specific user, maintaining a user authentication level for the user session, monitoring one or more factors relating to the user's activity, applying one or more rules to the monitored factors, detecting that a rule has indicated the user's current authentication level is too high, and lowering the user's authentication level, without ending the user's session.2016-03-03
20160065555ACCESSING A CLOUD-BASED SERVICE PLATFORM USING ENTERPRISE APPLICATION AUTHENTICATION - Systems for managing user-level security in a cloud-based service platform. A server in a cloud-based environment is configured to interface with storage devices that store objects that are accessible over a network by two or more users. An enterprise entity is identified using an enterprise identifier associated with the enterprise, and an application service is associated with an application identifier. An application service request comprising a user identifier and the application identifier is received, and authentication is determined based on the combination of the user identifier and a pre-authenticated application identifier. Once the application service request is authenticated, then specific aspects of the service request are authorized. The integrity of the application identifier is confirmed by locating a secure association of the given application identifier to a pre-shared enterprise identifier. Logging, auditing and other functions can be performed at the user level using the user identifier for user-level tracking.2016-03-03
20160065556BOOTSTRAP MECHANISM FOR ENDPOINT DEVICES - A method of bootstrapping between endpoint client and server in a low power wireless network. The method includes the steps of initiating a bootstrap request from an endpoint client to the server with the bootstrap request including an endpoint client name in an identifier, determining a registry apparatus to be assigned to the endpoint client, accepting the bootstrap request at the server and in response to the bootstrap request providing a security object and an identifier to the endpoint client to identify the assigned registry apparatus.2016-03-03
20160065557ELECTRONIC DEVICE AND METHOD FOR MANAGING RE-ENROLLMENT - The present disclosure relates to electronic devices and methods for managing re-enrollment. According to the present disclosure, a method for managing re-enrollment of an electronic device may comprise storing data necessary for re-enrollment to manage the electronic device, reading the stored data corresponding to any one of initialization of the electronic device and deletion of a pre-stored management agent, sending a request for information necessary for authentication using the read data, and receiving at least one of the information necessary for authentication and a management agent installation file received corresponding to the request.2016-03-03
20160065558IDENTITY VERIFICATION FOR ONLINE EDUCATION - A method includes, in connection with a submission of a user's coursework in an online education course event, prompting the user to provide authentication information for a user authentication process, which includes any of (1) a social network account login authentication process, (2) comparing a geolocation of the first communication device on which the online education course is presented and a previously registered geolocation, (3) comparing the geolocation of the first communication device and a geolocation of a second communication device associated with the user, and (4) a personalized challenge-response authentication process. The method further includes comparing the authentication information received from the user to stored information associated with the user, and issuing a verified credential to the user based on the comparing and on completion of the user's coursework.2016-03-03
20160065559Systems and Methods for Verifying Human Interaction with a Computer Interface - Exemplary methods and systems for verifying human interaction with a computer interface are described herein. An exemplary method includes a human-interaction verification system detecting a request by an access device to access network-based content, providing, for display by the access device, a visually dynamic representation of one or more security images associated with a passcode in response to the access request, receiving, by way of the access device, challenge-response input associated with the visually dynamic representation of the one or more security images, and performing an access operation based at least in part on a comparison of the challenge-response input to the passcode.2016-03-03
20160065560REDIRECTION METHOD FOR ELECTRONIC CONTENT - Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content.2016-03-03
20160065561Local, Paperless Document Sharing, Editing, and Marking System - Embodiments are directed to a local, paperless document sharing, editing, and marking system which allows users connected to a local network to share, view, edit, mark, and save documents without needing to download them from an internet-based cloud server. A router is used to create a secure, local network to which all participants connect. A user selects documents from a drive connected to the router and shares those documents with other attendees, allowing the attendees to edit, save, and share the documents, mark the documents as exhibits to a legal proceeding, save the documents to a drive, and/or email the documents.2016-03-03
20160065562METHOD AND SYSTEM FOR EFFICIENT PASSWORD INPUT - Embodiments of the present application disclose a method for receiving password input from a user. During operation, the system receives, by a computing device, user input indicating that a user is entering a password. The system displays a plurality of shortcut keyboards of a keyboard sequence in successive order based on an arrangement of characters in the password. The system displays a first shortcut keyboard with a first key labeled with at least a first character of the password prior to displaying a second shortcut keyboard with a second key labeled with one or more characters positioned subsequent to the first character in the password. The system then receives input from the user selecting at least one key of each shortcut keyboard from the plurality of shortcut keyboards, and determines the password entered by the user based on the characters entered by the user through the key selections.2016-03-03
20160065563METHOD AND APPARATUS FOR ACCESSING THIRD-PARTY RESOURCES - A method, system, and apparatus for providing a client access to third-party resources by utilizing third-party access tokens via a network gateway. The method can prevent the third-party access tokens from being exposed directly to the client environment. The client receives a gateway security credential, which encapsulates the third-party access token in an encrypted form. The client provides the gateway access token to the network gateway where the third-party access token is decrypted and then used to access the third-party resource. Client requests to the network gateway are executed using a custom API. The gateway relays the client requests to the appropriate third-party resources using the third-party-specific API with the decrypted third-party access token. Gateway access tokens are short-lived and can be renewed according to the client-environment life cycle.2016-03-03
20160065564Registration and Credential Roll-out for Accessing a Subscripton-based Service - A user may access a subscription-based service via a system comprising one or more devices with one or more separate domains where each domain may be owned or controlled by one or more different local or remote owners. Each domain may have a different owner, and a remote owner offering a subscription-based service may have taken ownership of a domain, which may be referred to as a remote owner domain. Further, the user may have taken ownership of a domain, which may be referred to as a user domain. In order for the user to access the subscription-based service, registration and credential roll-out may be needed. An exemplary registration and credential roll-out process may comprise registration of the user, obtaining credentials from the remote owner and storing the credentials.2016-03-03
20160065565System, Method and Process for Detecting Advanced and Targeted Attacks with the Recoupling of Kerberos Authentication and Authorization - A method, system and computer program for recoupling Kerberos Authentication and Authorization requests, the method including the steps of (a) extracting authorization information, including a copy of a Ticket Granting Ticket (TGT), from an authorization request; (b) retrieving authentication information including the TOT, the authentication information having been previously extracted from an authentication transaction and stored; (c) cross-referencing the extracted authorization information with the retrieved authentication information, such that a discrepancy between the cross-referenced information invokes a security event alert.2016-03-03
20160065566ESTABLISHING AND MAINTAINING AN IMPROVED SINGLE SIGN-ON (SSO) FACILITY - A backend server system includes at least one hardware processor configured to initiate and/or perform the following. A login page is sent to a browser executing on a client associated with a user; and an authentication process is performed with the client. The logic page is intercepted by a proxy, and a modified logic page is generated by the proxy by adding a routine to the logic page. The modified logic page is forwarded to the browser, and the routine causes the browser to loads an asynchronous engine configured to execute a login process with an authentication profiling service to retrieve login information for the back-end server, and complete the authentication process.2016-03-03
20160065567ENABLING DIGITAL SIGNATURES IN MOBILE APPS - A computer implemented method and apparatus for provisioning certificates for use in applying digital signatures to electronic content are described. A method for provisioning a certificate to a user for use in applying a digital signature to electronically stored content includes receiving a request for the certificate. Each certificate is unique to a particular user and is usable, by an application executable by a processor of a computer device, to apply a digital signature to electronically stored content. The method further includes embedding the certificate in a wrapper formatted according to a file format compatible with the application. The wrapper includes at least one attribute facilitating enforcement of one or more digital rights management rule(s), and the method further includes sending the wrapped certificate containing the embedded certificate to the computer device.2016-03-03
20160065568Just In Time Polymorphic Authentication - Methods, systems, apparatuses, and computer-readable media for utilizing just-in-time polymorphic authentication techniques to secure information are presented. In one or more embodiments, a computing platform may receive, from a computing device, a request to access a user account. In response to receiving the request to access the user account, the computing platform may dynamically select, based on one or more polymorphic authentication factors, an authentication method for authenticating a user of the computing device, and the authentication method may be selected from a plurality of predefined authentication methods. Subsequently, the computing platform may generate one or more authentication prompts based on the selected authentication method. The computing platform then may provide the one or more authentication prompts to the user of the computing device. The authentication prompts that are selected for and presented to a particular user during a given access attempt may vary across different attempts.2016-03-03
20160065569NEURAL AUTHENTICATION SYSTEM - In certain embodiments, a system receives a first request from a user to perform a function with an enterprise. The system communicates a second request for the user to provide a thought to facilitate authenticating the user with the enterprise. The system receives a string of characters corresponding to the thought. The string may be generated based at least in part upon electromagnetic signals, which the user generates by developing the thought. The system compares the received string to a stored string that corresponds to a thought of the user to authenticate the user. Based at least in part upon the comparison, the system determines whether the user is authenticated to perform the function.2016-03-03
20160065570AUTHENTICATION SYSTEM - A method for authenticating a user for performing a transaction comprises receiving unique knowledge of the user such as photoauthentication, and receiving a hardware profile associated with the user. The unique knowledge and the hardware profile are compared against previously stored data representing unique knowledge of the user and a hardware profile associated with the user. If both the received data representing the unique knowledge of the user and the received hardware profile are authenticated, the transaction is allowed to go forward.2016-03-03
20160065571SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT - Disclosed is a system and method for coordinating secured access to an access-controlled environment. A plurality of keys are stored, each associated with a user account and generated by executing a biometric authentication application, using identification information concerning the respective user and a component of the of the respective computing device. Access-control information identifies an access-controlled environment, and a transmission is received from a computing device that includes a respective key and an indicator indicating that the user's identity has been biometrically confirmed by the computing device. The key confirms that the user has been biometrically authenticated, and that the transmission is not a replay of a previously received transmission from the computing device. Access to the access-controlled environment is facilitated as a function of the verification, determination and confirmation.2016-03-03
20160065572Authentication Method and Apparatus Using Biometric Information and Context Information - The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A terminal is provided, which includes a sensing unit configured to collect authentication information; and a control unit configured to perform the authentication based on first authentication information and second authentication information, to control the sensing unit to collect third authentication information if it is determined that the authentication based on the first authentication information has succeeded and the authentication based on the second authentication information has failed, and to perform the authentication based on the third authentication information. Since the authentication is performed through a combination of biometric information and context information that are acquired from two or more terminals, reliability and security of the authentication can be heightened.2016-03-03
20160065573Trusted Application Migration Across Computer Nodes - An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.2016-03-03
20160065574USER MANAGEMENT FRAMEWORK FOR MULTIPLE ENVIRONMENTS ON A COMPUTING DEVICE - An environment manager in a computer executes multiple environments concurrently. A user management framework (UMF) virtual machine on the computer runs an authentication domain that supports user profile management of the multiple environments.2016-03-03
20160065575Communication Managing Method and Communication System - Disclosed are a communication managing method and a communication system, when an authentication of the user terminal is passed or the user information of the user terminal is changed, an AAA server sends the user information including authorization information of the user terminal to a service control server corresponding to the user terminal, the service control server performs the policy control on the service of the user terminal according to the user information, the realization process is simple and easy to be extended, which improves the processing efficiency and reduces the press of the service control server; meanwhile, in the above-mentioned scheme, the AAA server can send the user formation to the service control server independently, and it is not required that the authentication server must exist, thereby it can provide a wider application, provide a more flexible service development way for the operator, and further improve the processing efficiency.2016-03-03
20160065576SYSTEM AND METHODS FOR LEVERAGING AN OBJECT CACHE TO MONITOR NETWORK TRAFFIC - According to non-limiting embodiments disclosed herein, the functionality of an object cache in a server can be extended to monitor and track web traffic, and in particular to perform rate accounting on selected web traffic. As the server communicates with clients (e.g., receiving HTTP requests and responding to those requests), the server can use its existing object cache storage and existing object cache services to monitor web traffic by recording how often a client makes a particular request in the object cache and/or other data about the requests. Preferably, the object cache is still used for conventional caching of objects, the object cache thus providing a dual role by storing both web objects and rate accounting data.2016-03-03
20160065577SYSTEMS AND METHODS FOR PROVIDING DYNAMICALLY SELECTED MEDIA CONTENT ITEMS - Systems, methods, and non-transitory computer-readable media can identify a set of media content items associated with a first user of a social networking system. It can be determined that a second user of the social networking system is attempting to access at least a portion of the set of media content items associated with the first user. A first subset of media content items can be dynamically selected out of the set of media content items. In some cases, each media content item in the first subset can satisfy specified selection criteria. The second user can be provided with access to a representation of the first subset of media content items. In some instances, the representation of the first subset can be provided in a media access interface associated with the first user.2016-03-03
20160065578Method and System for Controlling Access to Shared Devices - A non-transitory computer readable medium includes computer readable program code including instructions for snooping a message from a client device addressed to a particular IP address corresponding to a shared device; determining whether the client device has authorization to access the shared device; responsive to determining that the client device does not have authorization to access the shared device, refraining from forwarding the message to the particular IP address; and responsive to determining that the client device has authorization to access the shared device, forwarding the message to the particular IP address.2016-03-03
20160065579METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - The present teaching relates to identity management. In one example, a trusted connector is instantiated in the enterprise system behind a security. The trusted connector is configured to communicate with the private resource via a communication protocol. Upon being triggered by the external system, a secure communication channel is established between the external system and the trusted connector. A request is received from the external source at the trusted connector through the secure communication channel. The request is interpreted for communicating with the private resource. The interpreted request is sent to the private resource. A response is received from the private resource. The response from the private resource is interpreted for communicating with the external system. The interpreted response is sent to the external system through the secure communication channel.2016-03-03
20160065580SYSTEM FOR TRANSACTION AUTHENTICATION - Systems and methods for secure transaction authorization are provided. An emulator is instantiated on a host device and configured to emulate an integrated circuit having a different instruction set than an integrated circuit of the host device, and a guest operating system executing on the emulated integrated circuit is configured to communicate with a host operating system of the host device through an emulated network interface of the emulator. Under control of one or more guest operating system processes executing on the emulated integrated circuit, a request is received over a first secure communication channel from an application executing on the host operating system to authorize a transaction. Further, based on the received request, user input is obtained from an input device of the host device and transformed into verification data. A different second secure communication channel is established to a remote system through the emulated network interface, and a request is sent over the second channel to the remote system to authorize the transaction based on the verification data. An authorization result is received from the remote system over the second secure communication channel, and a response is sent to the application over the first secure communication channel indicating the authorization result.2016-03-03
20160065581METHOD AND SYSTEM FOR EXCHANGING INFORMATION - Exchanging information includes receiving an authorization request provided by a data request terminal, generating an authorization information updating instruction based on the authorization request, updating, based on the authorization information updating instruction, authorization information of the data request terminal that is stored on the request processing server, the authorization information indicating that the data request terminal has authorization request processing authority, and causing the data request terminal to acquire a data request result corresponding to data request information.2016-03-03
20160065582METHOD AND APPARATUS FOR PROVIDING A HIGH SECURITY MODE IN A NETWORK - Systems and methods systems and methods for efficiently and securely forming a communication network. As a non-limiting example, various aspects of the present disclosure provide systems and methods, for example utilizing a plurality of different security modes, for forming a premises-based network (e.g., a MoCA network).2016-03-03
20160065583METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING COMMUNICATIONS SERVICES - An aspect of providing communications services to Internet Protocol-enabled devices includes storing, in an account of the subscriber, a globally unique identifier for each of a plurality of the devices associated with the subscriber. For each of the devices, the globally unique identifier is appended to a network address of the subscriber in the account, where each of the devices is uniquely addressable via the appended globally unique identifier and network address. An aspect also includes provisioning a subscriber-selected communications service for the account, and assigning to the account subscriber-selected permissions for defining access to features of the communications service for individuals specified in the account with respect to a corresponding device. The permissions are assigned based on a combined user identifier and corresponding globally unique identifier. An aspect further includes providing the communications service to the individuals associated with the account subject to the permissions.2016-03-03
20160065584PROTECTING DELIVERED WEB DISTRIBUTED CONTENT FROM UNAUTHORIZED MODIFICATIONS - A method of delivering web distributed content is disclosed. A set of web distributed content is received by a proxy server. The set of web distributed content is divided by the proxy server into a plurality of portions. Additional security code is added to the plurality of portions to form a modified set of web distributed content. The additional security code detects unauthorized modification of the modified set of web distributed content, wherein at least a portion of the modified set of web distributed content is different for different intended users of the set of web distributed content. The modified set of web distributed content is delivered by the proxy server to an intended user.2016-03-03
20160065585TEMPORARY AUTHORIZATIONS TO ACCESS A COMPUTING SYSTEM BASED ON USER SKILLS - Controlling access to a computing system. An escalation request is received for performing a protected activity on the computing system by a user not authorized to perform the protected activity. At least one activity indicator being indicative of a skill required to perform the protected activity is retrieved. At least one user indicator being indicative of the skill possessed by the user is retrieved. An indication of a capability of the user to perform the protected activity according to a comparison between the at least one activity indicator and the at least one user indicator is determined. A temporary authorization for performing the protected activity to the user according to the capability thereof is granted or denied. The temporary authorization lasts for a limited time window.2016-03-03
20160065586USAGE RIGHTS INFORMATION FOR PROTECTED CONTENT HAVING TWO PARTS - The invention relates to a device for accessing protected content, the device comprising a secure module for accessing the protected content and a control unit external to the secure module for controlling access operations for the protected content. The device is configured to receive usage rights data for the protected content, the usage rights data including first and second usage rights data defining permissions for uses of the protected content, and the device is configured to enable a requested use of the protected content upon a check whether the use is permitted by usage rights data, the check being made in the secure module based on to the first usage rights data and the check being made in the control unit based on the second usage rights data. Moreover, the invention relates to a method for operating the device.2016-03-03
20160065587METHODS AND SYSTEMS FOR A PORTABLE DATA LOCKER - The embodiments provide for binding files to an external drive, a secured external drive, or portable data locker. The files are bound in order to help restrict or to prevent access and modification by certain computers or users. Computers or users that are authorized or within the authorized domain are permitted full access. The files stored on the external drive may be bound in various ways. The files may be encapsulated in a wrapper that restricts the use and access to these files. The bound files may require execution of a specific application, plug-in, or extension. A computer may thus be required to execute program code that limits the use of the secured files. In one embodiment, the external drive provides the required program code to the computer. In other embodiments, the required program code may be downloaded from a network or provided by an external authority.2016-03-03
20160065588METHODS AND SYSTEMS FOR DETERMINING COMPLIANCE OF A POLICY ON A TARGET HARDWARE ASSET - Methods and systems for determining compliance of a policy on a target hardware asset are disclosed. In an embodiment, based on the policy, a command is generated at a host computing device. Subsequently, the command is transmitted to an I/O port of the target hardware asset over a communication channel. Further, a processor of the target hardware asset facilitates execution of the command. Based on the execution, a response may be generated. The response may be analyzed in order to determine compliance of the policy. Further in an embodiment, a priority level of the command may be controlled. The priority level determines allocation of a computing resource for execution of the command. The computing resource may be obtained from a computing resource pool including the processor and at least one virtual computing resource.2016-03-03
20160065589SYSTEMS AND METHODS FOR SECURELY PROVISIONING THE GEOGRAPHIC LOCATION OF PHYSICAL INFRASTRUCTURE ELEMENTS IN CLOUD COMPUTING ENVIRONMENTS - Systems and methods relating to improved security in cloud computing environments are disclosed. According to one illustrative implementation, a method for provisioning physical geographic location of a physical infrastructure device associated with a hypervisor host is provided. Further, the method may include performing processing to obtain initial geo location data of the device, determining verified geo location data of the device by performing validation, via an attestation service component, of the initial geo location data to provide verified geo location data, and writing the verified geo location data into HSM or TPM space of the hypervisor host.2016-03-03
20160065590IDENTIFICATION, AUTHENTICATION, AND AUTHORIZATION METHOD IN A LABORATORY SYSTEM - An identification, authentication and authorization method in a laboratory system is presented. The system comprises at least one laboratory device. The method comprises receiving identification data identifying a user; receiving identity confirmation data to authenticate the user; and generating authentication data upon successful authentication of the user. The authentication data is configured to enable authentication of the user based on only the identification data during a validity time period without repeated receipt of the identity confirmation data. The method further comprises receiving the identification data by an identification unit; validating the authentication data corresponding to the identification data comprising the step of verifying non-expiry of the validity time period; and granting authorization to the user for the laboratory device upon successful validation of the authentication data.2016-03-03
20160065591METHODS AND SYSTEMS FOR DATA VALIDATION IN A CLIENT-SERVER ENVIRONMENT - Methods and systems are provided for dynamically generating validation rules. In certain implementations, state information related to one or more operations is stored. A request for validation rules is received from a client. The request may include one or more parameters and an identification of an operation to be performed. In response to the request, the state information is accessed for the operation to be performed. The validation rules are then dynamically generated based on the accessed state information and at least one of the parameters or the identification in the request. The validation rules can then be transmitted to the client.2016-03-03
20160065592Internet Of Things Security - Apparati, methods, and computer-readable media for improving the security of communications networks. An embodiment of the present invention is a system for enabling smart devices (2016-03-03
20160065593DEVICE VERIFICATION PRIOR TO REGISTRATION - Embodiments are directed to registering a device to receive notifications. In one scenario, a computer system receives a notification registration request from a computing device. The computer system generates a registration secret which includes identification information that uniquely identifies the computing device, and sends the generated registration secret including the information that uniquely identifies the computing device to a notification service. The computer system receives a hash value from the computing device, where the hash value is generated based on the identification information of the generated registration secret. The computer system computes another hash value based on the identification information of the received registration secret to determine whether the second hash value matches the first hash value, and upon determining that the second hash value matches the first hash value, the computer system registers the computing device to receive notifications from the notification service.2016-03-03
20160065594INTRUSION DETECTION PLATFORM - A device receives user information associated with a user of a user device that is associated with a network, and creates a user profile, associated with the user, based on the user information. The device determines threats to the network, by the user, based on the user profile. The threats to the network include insider threats, advanced persistent threats, bring your own device (BYOD) threats, cloud security threats, malware threats, and/or denial of service (DoS) threats. The device stores or presents, for display, information associated with the determined threats to the network by the user.2016-03-03
20160065595APPARATUS AND METHOD FOR PERFORMING REAL-TIME NETWORK ANTIVIRUS FUNCTION - An apparatus and method for performing a real-time network antivirus function, which can perform, at high speed, real-time antivirus scanning on a transmission file in a network to be protected and blocking of a malicious file. The apparatus includes a packet processing unit for parsing input packets and outputting a transmission data stream, a packet-based checksum calculation unit for calculating a checksum of the transmission data stream for each packet, and outputting a signature included in the transmission data stream when a last packet of the transmission data stream is input, a virus scanning unit for performing virus scanning based on the signature, a detection and blocking unit for blocking each input packet or transmitting it to a destination, based on result of the virus scanning unit, and a caching unit for updating a blacklist, based on result of the detection and blocking unit.2016-03-03
20160065596MOBILE BOTNET MITIGATION - Mitigation of bot networks in wireless networks and/or on mobile devices is provided. A botnet detection component is provided that inspects data traffic and data flows on the wireless network to identify mobile devices that are suspected of behaving as bots. A traffic profile of the suspected bot behavior can be generated and forwarded to the mobile devices that are suspected of behaving as bots. The mobile device can correlate data traffic on the device to the traffic profile in order to identify applications responsible for the suspected bot behavior, and remove the identified applications.2016-03-03
20160065597SYSTEM FOR DOMAIN REPUTATION SCORING - The disclosure is related to computer-implemented methods for domain name scoring. In one example, the method includes receiving a request to provide a reputation score of a domain name, receiving input data associated with the domain name, extracting a plurality of features from the input data and the domain name, generating a feature vector based on the plurality of features, and calculating the reputation score of the domain name by a machine-learning classifier based on a graph database, which includes feature vectors associated with at least a plurality of reference domain names, a plurality of servers, a plurality of domain name owners, and so forth. In another example, the method can calculate the reputation score by finding a similarity between the feature vector and one of domain name clusters in the graph database. The reputation score represents a probability that the domain name is associated with malicious activity.2016-03-03
20160065598SECURITY THREAT INFORMATION ANALYSIS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information. One of the methods includes identifying intelligence types that each categorizes a subset of data, associating, for each of the intelligence types, each of the subsets of data, which are categorized by the respective intelligence type, with the respective intelligence type, determining rules for a third party that each indicate that the third party should receive data associated with particular types of potential security threats and priority information for the data, determining, for each of the potential security threats indicated in the rules, a group of the subsets that include information associated with the respective potential security threat, assigning, for each subset in each of the groups, a priority to the respective subset using the priority information, and providing the determined subsets to the third party using the respective priorities.2016-03-03
20160065599UNSTRUCTURED SECURITY THREAT INFORMATION ANALYSIS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating structured data using data received from unstructured textual data sources. One of the methods includes receiving unstructured textual data, identifying one or more keywords in the unstructured textual data, determining one or more patterns included in the unstructured textual data using the identified keywords, identifying one or more intelligence types that correspond with the unstructured textual data using the determined patterns, and associating, for each of the identified intelligence types, a data subset from the unstructured textual data with the respective intelligence type.2016-03-03
20160065600APPARATUS AND METHOD FOR AUTOMATICALLY DETECTING MALICIOUS LINK - An apparatus and method for automatically detecting a malicious link. The apparatus includes a threat information collection unit, a priority management unit, a malicious link collection unit, a malicious link analysis unit, and a malicious link tracking unit. The threat information collection unit collects threat information, and identifies whether a malicious link is present in each target site. The priority management unit determines the priorities of the target sites, and performs the assignment and management of the target sites in order to collect and analyze a malicious link. The malicious link collection unit collects the uniform resource locator (URL) of the malicious link from the target sites. The malicious link analysis unit analyzes a call correlation based on the collected URL, and analyzes the malicious link through pattern matching. The malicious link tracking unit tracks the real-time changing state of the malicious link.2016-03-03
20160065601System And Method For Detecting Lateral Movement And Data Exfiltration - A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.2016-03-03
20160065602Using A Content Delivery Network For Security Monitoring - A content delivery network includes a plurality of cache servers. Each cache server is configured to receive a request for content from a client system and receive content and security data from a content server. Each cache server is further configured to provide the content to the client system and provide the security data to a monitoring system.2016-03-03
20160065603COLLABORATIVE INFRASTRUCTURE SUPPORTING CYBER-SECURITY ANALYTICS IN INDUSTRIAL NETWORKS - A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is presented. In example embodiments the method may include identifying an abnormal operation pattern in the network system that may signal a cyber-security threat. In response to identifying the abnormal operation pattern, data related to a state change of an asset included in the network system is accessed. The method may further include determining that the abnormal operation pattern and the state change of the asset are correlated, and based on this determination, determining that the abnormal operation pattern is a false positive indicator with respect to the cyber-security threat.2016-03-03
20160065604ANOMALOUS EVENT DETECTION BASED ON METRICS PERTAINING TO A PRODUCTION SYSTEM - A machine may be configured to detect an anomalous event based on metrics pertaining to a production system. For example, the machine analyzes a time series of values associated with a metric pertaining to a production system. The machine identifies a pattern associated with the time series based on the analysis of the time series. The pattern may describe an occurrence of particular values at particular timestamps of the time series. The machine determines a range of potential values for a next timestamp in the time series based on the pattern. The machine assigns a score value to an actual value associated with the metric and corresponding to the next timestamp. The assigning of the score value may be based on a comparison of the actual value and the range of potential values. The machine identifies the actual value as a candidate for an alert based on the score value.2016-03-03
20160065605SPAM DETECTION FOR ONLINE SLIDE DECK PRESENTATIONS - The disclosed systems and methods are directed to detecting spam in an electronic presentation and determining whether the electronic presentation should be moderated. The example systems and methods may employ one or more classifiers for classifying an electronic presentation and, should the electronic presentation fall within a predetermined classification, the electronic presentation may be analyzed further for the presence of spam. Further analysis of the electronic presentation may include invoking one or more filters to determine whether the electronic presentation includes words and/or phrases known to be associated with spam. Where the electronic presentation is determined to contain spam, the electronic presentation may be removed from a database of electronic presentations, excluded from search results, or flagged for moderation by a moderator.2016-03-03
20160065606CLOUD BASED LOGGING SERVICE - Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service is integrated within a network security appliance by automatically configuring access settings for the logging service and providing a basic level of service from the logging service by registering a user account for the security appliance with the logging service. A log is transparently created within the logging service by making use of the automatically configured access settings and treating the logging service as a logging device. A request is received by the security appliance from an administrator to access data associated with the log. Responsive thereto and without requiring separate registration of the administrator with the cloud-based logging service, the data is transparently received by the security appliance from the logging service and is presented via a graphical user interface (GUI) of the security appliance.2016-03-03
20160065607System and Method For Managed Security Assessment and Mitigation - In an embodiment of the invention, a system for assessing vulnerabilities includes: a security management system; a network device in a system under test (SUT), wherein the network device is privy to traffic in the SUT; and wherein the SMS is privy to traffic that is known by the network device and/or to one or more traffic observations that is known by the network device.2016-03-03
20160065608MONITORING SECURITY RISKS TO ENTERPRISE CORRESPONDING TO ACCESS RIGHTS AND ACCESS RISK CALCULATION - A system comprising an interface and a memory communicatively coupled to a processor retrieves access information corresponding to an asset. The system stores one or more risk categories and one or more risk factors. The system determines the one or more risk categories corresponding to the access information and determines the one or more risk factors corresponding to the one or more risk categories. Based at least in part upon the one or more risk factors, the system calculates an access risk score for the asset. The system generates data visualization corresponding to the access risk score and the asset.2016-03-03
20160065609Domain Classification Based On Client Request Behavior - Systems and methods for domain classification using the network request behavior of clients are provided. The network requests of a plurality of clients are analyzed to determine a domain corresponding to each request. This information can be used to associate a set of domains with each individual client. Because of the reciprocal nature of a network request, the information is also used to associate a set of clients with each individual domain. Within the plurality of domains associated with the plurality of clients, there may exist known domains having a classification and unknown domains having no classification. Based on the correlation of clients and domains from their respective associations, the system generates domain classification information for at least one of the unknown domains.2016-03-03
20160065610ANONYMIZED NETWORK DATA COLLECTION AND NETWORK THREAT ASSESSMENT AND MONITORING SYSTEMS AND METHODS - Systems and methods for data collection and processing in a network, including one or more sensors disposed in a network interface and configured to collect raw signal traffic data where each sensor is further configured to parse the raw signal traffic data into network protocols; split the network protocols into content data and metadata; derive contextual metadata from the content data; compile the metadata and the derived metadata to produce anonymized metadata; encrypt the anonymized metadata; and transmit to the encrypted anonymized metadata to a unified data server.2016-03-03
20160065611ANALYZING DNS REQUESTS FOR ANOMALY DETECTION - A computer-implemented method for detecting anomalies in DNS requests comprises receiving a plurality of DNS requests generated within a predetermined period. The predetermined period includes a plurality of DNS data fragments. The method further includes receiving a first DNS request and selecting a plurality of second DNS requests from the plurality of DNS requests such that each of the second DNS requests is a subset of the first DNS request. The method also includes calculating a count value for each of the DNS data fragments, where each of the count values represents a number of instances the second DNS requests appear within one of the DNS data fragments. In some embodiments, the count values for each of the DNS data fragments can be normalized. The method further includes determining an anomaly trend, for example, based on determining that at least one of the count values exceeds a predetermined threshold value.2016-03-03
20160065612MULTIPLE OPERATING SYSTEM ROTATION ENVIRONMENT MOVING TARGET DEFENSE - Systems and methods for providing a multiple operating system rotation environment (“MORE”) moving target defense (“MTD”) computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.2016-03-03
20160065613SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE BASED ON WEB - A system and method for detecting malicious code based on the Web are disclosed herein. The system includes a Uniform Resource Locator (URL) collection unit, a data crawling unit, a malicious code candidate extraction unit, and a secure pattern filtering unit. The URL collection unit collects and stores the URL information of a web server. The data crawling unit crawls and stores the contents data of a website. The malicious code candidate extraction unit detects a pattern, matching previously stored malicious pattern information, in the stored data, and extracts an event including the detected pattern as a malicious code candidate. The secure pattern filtering unit detects a pattern, matching previously stored secure pattern information known as being secure, in the extracted malicious code candidate, filters out the event including the detected pattern from the extracted malicious code candidate, and outputs a remaining malicious code candidate as malicious code.2016-03-03
20160065614METHODS, SYSTEMS, AND MEDIA FOR MASQUERADE ATTACK DETECTION BY MONITORING COMPUTER USER BEHAVIOR - Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting masquerade attacks is provided, the method comprising: monitoring, using a hardware processor, a first plurality of user actions in a computing environment; generating a user intent model based on the first plurality of user actions; monitoring a second plurality of user actions in the computing environment; determining whether at least one of the second plurality of user actions deviates from the generated user intent model; determining whether the second plurality of user actions include performing an action on a file in the computing environment that contains decoy information in response to determining that at least one of the second plurality of user actions deviates from the generated user intent model; and generating an alert in response to determining that the second plurality of user actions include performing an action on a file in the computing environment that contains decoy information.2016-03-03
20160065615CLOUD-BASED SURVEILLANCE WITH INTELLIGENT TAMPER PROTECTION - In one embodiment, a security system includes a central communication unit and a first surveillance device. The central communication unit is communicatively connected over a network to cloud storage, by way of a first transmission channel and a second transmission channel. The second transmission channel is redundant with the first transmission channel. The first surveillance device configured to record first surveillance data, and is communicatively connected to the central communication unit by way of a third transmission channel and a fourth transmission channel. The fourth transmission channel is redundant with the third transmission channel. The first surveillance device is configured to transmit the first surveillance data to the central communication unit, and the central communication unit is configured to transmit the first surveillance data to the cloud storage.2016-03-03
20160065616Multi Cloud Policy Enactment via Organizations to Cloud-Provider Partnerships - A method includes acts for establishing a subscription for an entity. The method includes receiving, at a cloud service provider, a request from an entity to establish a subscription. The request includes credentials for the entity that are not proper credentials for an organization associated with the entity that the entity should use to access services for the organization. The method further includes performing a corrective action based on detecting one or more factors to determine that the entity is associated with the organization. The method further includes providing services based on the corrective action.2016-03-03
20160065617IMAGE MONITORING FRAMEWORK - A computing platform may receive, from a network device, a message identifying data that was transmitted by a user device located in a private network associated with an organization. The network device may be located at a boundary between the private network and a public network. The data may include one or more images and may be destined for a network address associated with the public network. The computing platform may generate and store a record corresponding to the message. The computing platform may receive, from an analysis platform, data indicating whether the image(s) comprise content that violates a data leak prevention (DLP) policy of the organization. The computing platform may identify the record corresponding to the message and may update the record corresponding to the message to reflect whether the image(s) comprise content that violates the DLP policy of the organization.2016-03-03
20160065618Method and Apparatus for Automating Security Provisioning of Workloads - A method of automating security provisioning is provided. The method includes receiving a request to start a virtual application and determining an owner of the virtual application. The method includes determining a workload based on the virtual application, the workload including an application and a virtual machine and assigning the workload to a security container or sub-container, among a plurality of security containers, based on the owner of the virtual application.2016-03-03
20160065619Distributed Multi-Processing Security Gateway - A system and method for a distributed multi-processing security gateway establishes a host side session, selects a proxy network address for a server, uses the proxy network address to establish a server side session, receives a data packet, assigns a central processing unit core from a plurality of central processing unit cores in a multi-core processor of the security gateway to process the data packet, processes the data packet according to security policies, and sends the processed data packet. The proxy network address is selected such that a same central processing unit core is assigned to process data packets from the server side session and the host side session. By assigning central processing unit cores in this manner, higher capable security gateways are provided.2016-03-03
20160065620NETWORK MALICIOUSNESS SUSCEPTIBILITY ANALYSIS AND RATING - Network security and robustness is analyzed by developing correlations among network maliciousness observations to determine attack susceptibility. Network traffic is analyzed at the autonomous system (AS) level, among connected Internet Protocol (IP) routing prefixes, to identify these observations. The traffic is monitored for any of a number of specified mismanagement metrics. Correlations among these metrics are determined and a unified network mismanagement metric is developed, indicating network susceptibility to potentially malicious attack.2016-03-03
20160065621Generating Accurate Preemptive Security Device Policy Tuning Recommendations - An approach is provided for determining a likelihood of an attack on a first computer system of a first business. Characteristics of the first business and a second business are determined. The second business has a second computer system currently or recently under attack. The characteristics include respective industries, sizes, geographical locations, types of sensitive data, and security vulnerabilities associated with the first and second businesses or first and second computer systems, an address of traffic through a device in the first computer system, and an address of an entity responsible for the attack on the second computer system. Based on a similarity between the characteristics of the first and second businesses, a likelihood that the entity responsible for the attack on the second computer system will attack the first computer system of the first business is determined.2016-03-03
20160065622OIL FIELD PROCESS CONTROL SYSTEM - An oil field process control system including a field versatile control gateway component that interfaces with a plurality of field devices using a broad range of hardwired and wireless protocols, offering in-the-field monitoring and control of each of the field devices and communicates with a remote central control room, exchanging data between the control room and the field using a multiplexed protocol that offers high data speeds and bandwidth, enabling a significant reduction of the amount of wiring, and conduits and other infrastructure expenses that would otherwise be incurred for such a highly reliable communications system.2016-03-03
20160065623HYBRID CLOUD MEDIA ARCHITECTURE FOR MEDIA COMMUNICATIONS - A request to establish a communication session is received at a cloud communication application. The request is from a first enterprise communication device to establish a communication session with a second communication device that is typically also within the enterprise. In response to receiving the request to initiate the communication session, the cloud communication application directs the first enterprise communication device to use an enterprise media server for sending a media stream of the first communication session. This allows the cloud communication application to provide one or more cloud services for the media stream via a communication channel that has been previously established between the cloud communication application and the enterprise media server. This results in the media stream being sent within the enterprise, thus, providing enhanced security. In addition, less bandwidth is required because the media streams do not have to be sent to and from the cloud.2016-03-03
20160065624Method and Apparatus for Bidirectional Emulation of Telephonic Device Communication - The present systems and processes are directed to bridging telephone communications, such that a SIP communication server is able to communicate with the legacy PBX or key system interface for interworking connectivity of the devices. A bidirectional emulator module is provided permitting a communication session with legacy analog device and/or digital device. In certain embodiments, analog and digital telephones are registered with the emulator. An external telephone system such as a SIP communication server is also registered. A line dictionary contains the communication protocols of the analog and digital telephones and external telephone system. Outgoing line traffic and incoming line traffic are monitored in real-time, where the emulator module translates the user requests and line traffic according to the respective communication protocol data retrieved from the line dictionary.2016-03-03
20160065625Notification of Change in Online Conferencing - In one embodiment, an attendee of an online conference is notified of hidden changes to shared content of the online conference. When an attendee changes their focus, as indicated by minimizing, covering, or otherwise obstructing shared content of an online conference, the conference is monitored for changes. If an event or change is detected in the online conference, the attendee is informed of the event and/or shown the change. In addition or as an alternative to event detection, a thumbnail image of the shared content is created so that the attendee can monitor for changes.2016-03-03
20160065626CROSS DEVICE TASK CONTINUITY - Systems and methods for cross device and/or cross operating system task continuity between devices for frictionless task engagement and reengagement. Task continuity can provide for simple detection and selection of recently viewed and/or modified tasks. Task continuity can provide for simple engagement of new tasks in applications and/or websites, the new tasks being related to recently presented and/or modified tasks. Responsive to selection of the recently presented and/or modified task, the task can be seamlessly reengaged from the point at which it was last presented and/or modified. Responsive to selection of a new task, the task can be engaged from a starting point. Upon completion of the task on one device, the task can be closed across devices. Task continuity can be enabled on a single device or across a plurality of devices. Task continuity can be enabled on a single operating system, or across a plurality of operating systems.2016-03-03
20160065627CONFIGURABLE METADATA-BASED AUTOMATION AND CONTENT CLASSIFICATION ARCHITECTURE FOR CLOUD-BASED COLLABORATION PLATFORMS - Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified metadata rules to metadata events. More specifically, the scalable architecture described herein uses metadata to drive automations and/or polices in a cloud-based environment. In one embodiment, the architecture integrates a metadata service with an event-based automation engine to automatically trigger polices and/or automations based on metadata and/or changes in metadata changes. The metadata service can include customizable and/or pre-build metadata templates which can be used to automatically apply a metadata framework (e.g., particular fields) to files based on, for example, the upload or placement of a particular file in a particular folder. The architecture also provides for advanced metadata searching and data classification.2016-03-03
Website © 2025 Advameg, Inc.